Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Phishing

Known as: Phishers, Phishing scam, Phising 
Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Phishing websites, fraudulent sites that impersonate a trusted third party to gain access to private data, continue to cost… Expand
  • table 1
  • table 2
  • table 4
  • figure 1
  • table 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
In this paper, we study the eectiveness of phishing blacklists. We used 191 fresh phish that were less than 30 minutes old to… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Many popular web browsers are now including active phishing warnings after previous research has shown that passive warnings are… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Phishing is a significant problem involving fraudulent email and web sites that trick unsuspecting users into revealing private… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Each month, more attacks are launched with the aim of making web users believe that they are communicating with a trusted entity… Expand
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Sometimes a "friendly" email message tempts recipients to reveal more online than they otherwise would, playing right into the… Expand
  • table 1
  • figure 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and… Expand
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Security toolbars in a web browser show security-related information about a website to help users detect phishing attacks… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?